Latest news with #Armoury


Vancouver Sun
12-05-2025
- General
- Vancouver Sun
New Westminster Heritage Homes Tour explores private residences and wartime spaces
During the Second World War, New Westminster became a hub for soldiers from all over the country waiting to be transferred to other bases or shipped overseas. Heritage New West is celebrating this legacy, and honouring the 80th anniversary of VE-Day on May 8, with On the Homefront theme for this year's New Westminster Heritage Homes Tour on May 25. Stories of local soldiers who died or were killed during the war will be showcased in the homes that they grew up in. Soldiers like the brothers Mayo and Bruce Barber, who were raised on Hamilton Street. 'It's very poignant,' says Catherine Hutson, director of Heritage New West. Stay on top of the latest real estate news and home design trends. By signing up you consent to receive the above newsletter from Postmedia Network Inc. A welcome email is on its way. If you don't see it, please check your junk folder. The next issue of Westcoast Homes will soon be in your inbox. Please try again Interested in more newsletters? Browse here. 'There wasn't any thought but, 'We're going to sign up and do this.' And a lot of them didn't come back. The war changed the dynamics of neighbourhoods for years to come.' The tour features both privately owned heritage homes and wartime spaces. The latter include the Armoury, the Royal Westminster Regiment Museum (formerly the Gun Room at the Armoury), and Westminster Club, now Galbraith House. 'The Westminster Club was this amazing Victorian house from the 1890s,' Hutson says. 'It was a destination for returning soldiers. They could have coffee, play pool, unwind. It was just down the street from the Armoury, which was one of the busiest depots in Western Canada.' Exhibits at the Royal Westminster Regiment Museum will include photographs, uniforms, medals, weapons, and rare artifacts alongside a memorial case honouring fallen soldiers, and profiles of seven local soldiers. The tour takes place from 10 a.m. to 5 p.m. at several heritage locations across New Westminster. A ticket guidebook — serving as a tour passport and map — is required for entry and must be picked up in advance at Royal City Colours (700 Twelfth Street, New Westminster). Tickets are $45 and available via Eventbrite Proceeds from the tour support local heritage initiatives. More info:


Forbes
28-03-2025
- Forbes
These Hackers Use Your GPU To Load Password-Stealing Malware
Never underestimate hackers' ingenuity. I learned this very early on in my hacking career, and it's as accurate now as it was in the late 1980s. What's more, this mantra unfortunately applies to hackers of the criminal variety as well as those who do so much good work. Remember, hacking is not a crime until it is. A case in point is when it comes to the deployment of infostealer malware. You know, the software that is being used by so many cybercriminals to compromise credentials, leading to account theft as well as vast quantities of stolen passwords being traded on the dark web. The latest example can be found by hackers using the CoffeeLoader family that executes code using the system GPU in order to evade detection. Graphics cards and the software surrounding them are not a new target for cybercriminals. Whether it's security vulnerabilities in GPU display drivers, or virtual GPU software, you can bet your bottom dollar that hackers are looking out for ways to exploit this powerful part of your system. Infostealer malware attacks that use the GPU are not something I have come across before, at least not to my failing old-man memory. However, CoffeeLoader hackers seem to be employing just this methodology to launch attacks. In a March 26 posting, Brett Stone-Gross, the senior director of threat intelligence at Zscaler, detailed precisely how the CoffeeLoader malware family is being deployed with the help of your graphics card. The whole purpose of the CoffeeLoader malware is to evade detection and bypass security protections in order to download and execute second-stage payloads, the infostealers in question. CoffeeLoader achieves this by employing a sophisticated packer utilizing the GPU as well as call stack spoofing and sleep obfuscation. 'The loader leverages a packer, which we named Armoury,' Stone-Gross said, 'that executes code on a system's GPU to hinder analysis in virtual environments.' The use of packers is a typical behavior of malware families, but the unpacking of the samples contained is rarely mentioned in security reports because, well, it's pretty boring and largely of little importance in the broader scheme of things. This is not the case with CoffeeLoader thanks to the clearly distinguishable packer used that can leverage the GPU in such a way as to execute initial malware code to complicate the threat analysis process. Zscaler ThreatLabz has named this packer Armoury 'because it impersonates the legitimate Armoury Crate utility created by ASUS.' Zscaler has said that CoffeeLoader has been observed being deployed with SmokeLoader, sold as a crimewave kit that includes password-stealing as part of the package. Smoke was subject to law enforcement disruption in 2024, having been active for many years, but apparently, that hasn't killed it off.